BRPI0520174A2 - non-hierarchical authentication and authorization - Google Patents

non-hierarchical authentication and authorization

Info

Publication number
BRPI0520174A2
BRPI0520174A2 BRPI0520174-8A BRPI0520174A BRPI0520174A2 BR PI0520174 A2 BRPI0520174 A2 BR PI0520174A2 BR PI0520174 A BRPI0520174 A BR PI0520174A BR PI0520174 A2 BRPI0520174 A2 BR PI0520174A2
Authority
BR
Brazil
Prior art keywords
user
certificate
trusted
authorization
access
Prior art date
Application number
BRPI0520174-8A
Other languages
Portuguese (pt)
Inventor
Rohit Gupta
Todd R Manion
Ravi T Rao
Sandeep K Singhal
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of BRPI0520174A2 publication Critical patent/BRPI0520174A2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

AUTENTICAÇçO E AUTORIZAÇçO NAO HIERARQUIZADAS. O mecanismo de autenticação utiliza o armazenador de pessoas confiáveis que pode ser preenchido individualmente pelos usuários dos dispositivos de computação, e pode compreender certificados das entidades que o usuário deseja permitir que ajam como autoridades de certificação. Consequentemente, as conexões não hierarquizadas podem ser realizadas mesmo se nenhum dispositivo apresentar um certificado ou corrente de certificados assinado por uma autoridade de certificação de terceira parte, desde que cada dispositivo apresente um certificado ou corrente de certificados assinado por um dispositivo presente no armazenador de pessoas confiáveis. Uma vez autenticado, o usuário remoto pode acessar os recursos confiáveis no dispositivo hospedeiro fazendo com que os processos locais representem o usuário e criem um token adequado pela alteração da senha do usuário ou tipo de senha para uma informação não válida do certificado do usuário e então conectando o usuário. O token pode ser referido de forma padrão para determinar se o usuário remoto está autorizado a acessar o recurso confiável.AUTHENTICATION AND AUTHORIZATION NOT Hierarchical. The authentication mechanism uses the trusted person store that can be populated individually by users of computing devices, and can comprise certificates of the entities that the user wants to allow them to act as certification authorities. As a result, unhierarchical connections can be made even if no device has a certificate or certificate chain signed by a third party certification authority, provided that each device has a certificate or certificate chain signed by a device in the people store. reliable. Once authenticated, the remote user can access trusted resources on the host device by having local processes represent the user and create an appropriate token by changing the user's password or password type to invalid user certificate information and then connecting the user. The token can be referenced by default to determine if the remote user is authorized to access the trusted resource.

BRPI0520174-8A 2005-04-20 2005-08-01 non-hierarchical authentication and authorization BRPI0520174A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/110,592 US7350074B2 (en) 2005-04-20 2005-04-20 Peer-to-peer authentication and authorization
PCT/US2005/027273 WO2006115522A1 (en) 2005-04-20 2005-08-01 Peer-to-peer authentication and authorization

Publications (1)

Publication Number Publication Date
BRPI0520174A2 true BRPI0520174A2 (en) 2009-04-22

Family

ID=37188454

Family Applications (1)

Application Number Title Priority Date Filing Date
BRPI0520174-8A BRPI0520174A2 (en) 2005-04-20 2005-08-01 non-hierarchical authentication and authorization

Country Status (11)

Country Link
US (1) US7350074B2 (en)
EP (1) EP1872502B1 (en)
JP (1) JP4965558B2 (en)
KR (1) KR101150108B1 (en)
CN (1) CN101171782B (en)
BR (1) BRPI0520174A2 (en)
MX (1) MX2007011601A (en)
MY (1) MY149418A (en)
RU (1) RU2390945C2 (en)
TW (1) TWI407750B (en)
WO (1) WO2006115522A1 (en)

Families Citing this family (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7065587B2 (en) * 2001-04-02 2006-06-20 Microsoft Corporation Peer-to-peer name resolution protocol (PNRP) and multilevel cache for use therewith
US20060294381A1 (en) * 2005-06-22 2006-12-28 Mitchell Douglas P Method and apparatus for establishing a secure connection
US8417949B2 (en) * 2005-10-31 2013-04-09 Microsoft Corporation Total exchange session security
JP4983165B2 (en) * 2006-09-05 2012-07-25 ソニー株式会社 COMMUNICATION SYSTEM AND COMMUNICATION METHOD, INFORMATION PROCESSING DEVICE AND METHOD, DEVICE, PROGRAM, AND RECORDING MEDIUM
US8590002B1 (en) 2006-11-29 2013-11-19 Mcafee Inc. System, method and computer program product for maintaining a confidentiality of data on a network
US8091134B2 (en) * 2006-11-29 2012-01-03 Lenovo (Singapore) Pte. Ltd. System and method for autonomic peer-to-peer virus inoculation
US8621008B2 (en) 2007-04-26 2013-12-31 Mcafee, Inc. System, method and computer program product for performing an action based on an aspect of an electronic mail message thread
SE531820C2 (en) * 2007-06-13 2009-08-18 Headweb Ab Procedure and system for legal file sharing
US8199965B1 (en) 2007-08-17 2012-06-12 Mcafee, Inc. System, method, and computer program product for preventing image-related data loss
US20130276061A1 (en) 2007-09-05 2013-10-17 Gopi Krishna Chebiyyam System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session
US7949771B1 (en) * 2007-09-05 2011-05-24 Trend Micro Incorporated Authentication of unknown parties in secure computer communications
GB2456290B (en) * 2007-10-05 2011-03-30 Iti Scotland Ltd Distributed protocol for authorisation
ES2394107T3 (en) * 2007-11-05 2013-01-21 Alcatel Lucent Peer network
CN100553212C (en) 2007-11-16 2009-10-21 西安西电捷通无线网络通信有限公司 A kind of reliable network access control system of differentiating based on the ternary equity
US8893285B2 (en) * 2008-03-14 2014-11-18 Mcafee, Inc. Securing data using integrated host-based data loss agent with encryption detection
US8353053B1 (en) * 2008-04-14 2013-01-08 Mcafee, Inc. Computer program product and method for permanently storing data based on whether a device is protected with an encryption mechanism and whether data in a data structure requires encryption
US7979899B2 (en) 2008-06-02 2011-07-12 Microsoft Corporation Trusted device-specific authentication
US8996726B2 (en) 2008-06-19 2015-03-31 Qualcomm Incorporated Methods and apparatus for event distribution and routing in peer-to-peer overlay networks
US9077684B1 (en) 2008-08-06 2015-07-07 Mcafee, Inc. System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy
JP5347403B2 (en) * 2008-09-22 2013-11-20 ソニー株式会社 Information processing apparatus and method, program, and information processing system
US8412930B2 (en) 2008-10-09 2013-04-02 Microsoft Corporation Device authentication within deployable computing environment
US8032930B2 (en) * 2008-10-17 2011-10-04 Intuit Inc. Segregating anonymous access to dynamic content on a web server, with cached logons
US20100235625A1 (en) * 2009-03-13 2010-09-16 Ravi Kant Pandey Techniques and architectures for preventing sybil attacks
CN101534262B (en) * 2009-03-30 2011-04-20 成都市华为赛门铁克科技有限公司 A message transmission method, network device and network system
US8281381B2 (en) * 2009-08-03 2012-10-02 Novell, Inc. Techniques for environment single sign on
US8914628B2 (en) * 2009-11-16 2014-12-16 At&T Intellectual Property I, L.P. Method and apparatus for providing radio communication with an object in a local environment
US8875285B2 (en) * 2010-03-24 2014-10-28 Microsoft Corporation Executable code validation in a web browser
US10482254B2 (en) * 2010-07-14 2019-11-19 Intel Corporation Domain-authenticated control of platform resources
US8856516B2 (en) 2010-09-17 2014-10-07 Skype Certificate revocation
US8826010B2 (en) * 2010-09-17 2014-09-02 Skype Certificate revocation
US9270471B2 (en) 2011-08-10 2016-02-23 Microsoft Technology Licensing, Llc Client-client-server authentication
EP2600274B1 (en) * 2011-12-02 2019-04-24 BlackBerry Limited Method Of Sending A Self-Signed Certificate From A Communication Device
JP5980961B2 (en) * 2012-03-08 2016-08-31 インテル コーポレイション Multi-factor certificate authority
US8811950B2 (en) * 2012-03-30 2014-08-19 Qualcomm Incorporated Methods and apparatus for controlling devices with no or limited WWAN capability in peer to peer communication
US9202016B2 (en) * 2012-08-15 2015-12-01 Verizon Patent And Licensing Inc. Management of private information
CN103873248B (en) * 2012-12-16 2017-04-12 航天信息股份有限公司 Encryption method and device with certificate based on identity
US9197700B2 (en) * 2013-01-18 2015-11-24 Apple Inc. Keychain syncing
US9077759B2 (en) 2013-01-18 2015-07-07 Apple Inc. Conflict resolution for keychain syncing
US20140281502A1 (en) * 2013-03-15 2014-09-18 General Instrument Corporation Method and apparatus for embedding secret information in digital certificates
US9641614B2 (en) * 2013-05-29 2017-05-02 Microsoft Technology Licensing, Llc Distributed storage defense in a cluster
US10404520B2 (en) 2013-05-29 2019-09-03 Microsoft Technology Licensing, Llc Efficient programmatic memory access over network file access protocols
US9838424B2 (en) 2014-03-20 2017-12-05 Microsoft Technology Licensing, Llc Techniques to provide network security through just-in-time provisioned accounts
US20150281225A1 (en) * 2014-03-27 2015-10-01 Microsoft Corporation Techniques to operate a service with machine generated authentication tokens
US9716716B2 (en) * 2014-09-17 2017-07-25 Microsoft Technology Licensing, Llc Establishing trust between two devices
US10489309B2 (en) 2014-10-21 2019-11-26 Intel Corporation Memory protection key architecture with independent user and supervisor domains
TW201626767A (en) * 2015-01-15 2016-07-16 Universal Global Scient Ind Co Authority control method of an internet of things appliance for offline sharing
GB2535165B (en) * 2015-02-09 2021-09-29 Arm Ip Ltd A method of establishing trust between a device and an apparatus
CN104703252B (en) 2015-02-13 2018-06-22 小米科技有限责任公司 Terminal device accesses the method and device of wireless network
CN106209734B (en) * 2015-04-30 2019-07-19 阿里巴巴集团控股有限公司 The identity identifying method and device of process
US9979553B2 (en) * 2015-08-06 2018-05-22 Airwatch Llc Secure certificate distribution
KR20180108566A (en) 2015-10-14 2018-10-04 캠브리지 블록체인 엘엘씨 SYSTEM AND METHOD FOR MANAGING DIGITAL IDENTITY
US10614532B1 (en) 2016-03-11 2020-04-07 Opower, Inc. Interactive analytics platform responsive to data inquiries
US10050963B2 (en) * 2016-03-29 2018-08-14 Microsoft Technology Licensing, Llc Securing remote authentication
US11030630B2 (en) * 2016-07-29 2021-06-08 Hewlett-Packard Development Company, L.P. Workflow-authorizing computing device authentication
US10320571B2 (en) * 2016-09-23 2019-06-11 Microsoft Technology Licensing, Llc Techniques for authenticating devices using a trusted platform module device
US11182349B2 (en) 2017-06-04 2021-11-23 Apple Inc. Synchronizing content
GB2565282B (en) * 2017-08-02 2021-12-22 Vnc Automotive Ltd Remote control of a computing device
US11290466B2 (en) * 2017-08-16 2022-03-29 Cable Television Laboratories, Inc. Systems and methods for network access granting
EP3585028A1 (en) * 2018-06-20 2019-12-25 Siemens Aktiengesellschaft Method for connecting a terminal to a cross-linkable computer infrastructure
US11316857B2 (en) * 2018-07-11 2022-04-26 Cyber Ark Software Ltd. Automated creation of dynamic privileged access resources
CN108833445B (en) * 2018-07-31 2021-04-16 中国银联股份有限公司 Authentication method and device suitable for Internet of things system
US10965676B2 (en) * 2018-10-02 2021-03-30 Ca, Inc. Peer authentication by source devices
US11068598B2 (en) * 2018-11-01 2021-07-20 Dell Products L.P. Chassis internal device security
US10873468B2 (en) * 2019-02-22 2020-12-22 Beyond Identity Inc. Legacy authentication for user authentication with self-signed certificate and identity verification
CN113785532B (en) * 2019-05-09 2024-02-02 三星电子株式会社 Method and apparatus for managing and verifying certificates
CN110728386A (en) * 2019-08-28 2020-01-24 中铁程科技有限责任公司 Information verification method and device and computer equipment
CN110728611A (en) * 2019-08-28 2020-01-24 中铁程科技有限责任公司 Method and device for providing service of receiving and sending station and computer equipment
WO2021230636A1 (en) * 2020-05-11 2021-11-18 Samsung Electronics Co., Ltd. System and method for certificate based authentication for tethering
CN114168924B (en) * 2022-02-10 2022-07-12 亿次网联(杭州)科技有限公司 Method and system for group member mutual authentication based on digital certificate

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5638448A (en) * 1995-10-24 1997-06-10 Nguyen; Minhtam C. Network with secure communications sessions
US6144959A (en) * 1997-08-18 2000-11-07 Novell, Inc. System and method for managing user accounts in a communication network
US6134327A (en) * 1997-10-24 2000-10-17 Entrust Technologies Ltd. Method and apparatus for creating communities of trust in a secure communication system
US6308266B1 (en) * 1998-03-04 2001-10-23 Microsoft Corporation System and method for enabling different grades of cryptography strength in a product
US6615347B1 (en) * 1998-06-30 2003-09-02 Verisign, Inc. Digital certificate cross-referencing
US6304974B1 (en) * 1998-11-06 2001-10-16 Oracle Corporation Method and apparatus for managing trusted certificates
US6363376B1 (en) * 1999-08-02 2002-03-26 Individual Software, Inc. Method and system for querying and posting to multiple career websites on the internet from a single interface
US7065587B2 (en) 2001-04-02 2006-06-20 Microsoft Corporation Peer-to-peer name resolution protocol (PNRP) and multilevel cache for use therewith
US7380279B2 (en) * 2001-07-16 2008-05-27 Lenel Systems International, Inc. System for integrating security and access for facilities and information systems
US7068789B2 (en) 2001-09-19 2006-06-27 Microsoft Corporation Peer-to-peer name resolution protocol (PNRP) group security infrastructure and method
US7493363B2 (en) 2001-09-19 2009-02-17 Microsoft Corporation Peer-to-peer group management and method for maintaining peer-to-peer graphs
US7299351B2 (en) 2001-09-19 2007-11-20 Microsoft Corporation Peer-to-peer name resolution protocol (PNRP) security infrastructure and method
TWI221722B (en) * 2001-11-15 2004-10-01 Ind Tech Res Inst Access control system of work-flow proceeded on basis of electronic certificate and method thereof
US7120691B2 (en) * 2002-03-15 2006-10-10 International Business Machines Corporation Secured and access controlled peer-to-peer resource sharing method and apparatus
US7130999B2 (en) * 2002-03-27 2006-10-31 Intel Corporation Using authentication certificates for authorization
US7051102B2 (en) 2002-04-29 2006-05-23 Microsoft Corporation Peer-to-peer name resolution protocol (PNRP) security infrastructure and method
US20030236976A1 (en) 2002-06-19 2003-12-25 Microsoft Corporation Efficient membership revocation by number
US7392375B2 (en) * 2002-09-18 2008-06-24 Colligo Networks, Inc. Peer-to-peer authentication for real-time collaboration
US7461260B2 (en) * 2002-12-31 2008-12-02 Intel Corporation Methods and apparatus for finding a shared secret without compromising non-shared secrets
US7397922B2 (en) 2003-06-27 2008-07-08 Microsoft Corporation Group security
US7188254B2 (en) 2003-08-20 2007-03-06 Microsoft Corporation Peer-to-peer authorization method
US7546373B2 (en) * 2003-11-14 2009-06-09 Microsoft Corporation Secure dynamic credential distribution over a network

Also Published As

Publication number Publication date
EP1872502A1 (en) 2008-01-02
US20060242405A1 (en) 2006-10-26
RU2007138936A (en) 2009-04-27
US7350074B2 (en) 2008-03-25
RU2390945C2 (en) 2010-05-27
KR101150108B1 (en) 2012-06-11
MX2007011601A (en) 2007-11-22
CN101171782B (en) 2012-08-15
JP4965558B2 (en) 2012-07-04
TWI407750B (en) 2013-09-01
EP1872502A4 (en) 2008-08-06
MY149418A (en) 2013-08-30
JP2008537256A (en) 2008-09-11
EP1872502B1 (en) 2019-07-17
KR20070122495A (en) 2007-12-31
CN101171782A (en) 2008-04-30
WO2006115522A1 (en) 2006-11-02
TW200638723A (en) 2006-11-01

Similar Documents

Publication Publication Date Title
BRPI0520174A2 (en) non-hierarchical authentication and authorization
AU2017100968A4 (en) System for issuance, verification and use of digital identities on a public or private ledger.
ES2318645T3 (en) PROCEDURES AND SYSTEM FOR STORAGE AND RECOVERING IDENTITY MAPPING INFORMATION.
BRPI0711042A8 (en) SYSTEM, METHOD FOR ENABLING A RIGHT ISSUER TO CREATE AUTHENTICATION DATA RELATED TO AN OBJECT AND/OR ENCRYPTION THE OBJECT USING A DIVERSIFIED KEY AND DEVICE
MX2020003721A (en) System and method for generating and depositing keys for multi-point authentication.
Durand et al. Decentralized web of trust and authentication for the internet of things
WO2008021454A3 (en) Federated credentialing system and method
JP2010533344A5 (en)
ES2773705T3 (en) Method to provide secure digital signatures
US8392703B2 (en) Electronic signature verification method implemented by secret key infrastructure
Ziyad et al. A multifactor biometric authentication for the cloud
Xu et al. Privacy-preserving and efficient truly three-factor authentication scheme for telecare medical information systems
CN101626292A (en) Linux log-on protection method
Addobea et al. Secure multi-factor access control mechanism for pairing blockchains
Jung Blockchain-based new identification system
Devi et al. Digital Identity Management System Using Blockchain
Hasan et al. Interaction provenance model for unified authentication factors in service oriented computing
Gudavalli et al. Securing e-governance services through biometrics
Kumar et al. Multi-factor authentication process using more than one token with watermark security
Tran et al. A security-aware access model for data-driven ehr system
BR102013030974A2 (en) ACCESS CONTROL USING RADIO FREQUENCY BLUETOOTH TYPE
Cohen et al. Federated Account System For Accelerated Development of Internal Systems
ES2792177T3 (en) Procedure and device for authenticating a user
Millman Authentication and Authorization
Solanki et al. BlockID: Blockchain based Digital ID and Authentication System for Privacy Improvement

Legal Events

Date Code Title Description
B08F Application dismissed because of non-payment of annual fees [chapter 8.6 patent gazette]

Free format text: REFERENTE A 8A ANUIDADE.

B08K Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette]

Free format text: REFERENTE AO DESPACHO 8.6 PUBLICADO NA RPI 2260 DE 29/04/2014.